MEDIUM · 5.8

CVE-2011-3599

The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine...

Vulnerability Description

The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.

CVSS Score

5.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:N
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
Adam KennedyCrypt-Dsa<= 1.17
PerlPerlAll versions

Related Weaknesses (CWE)

References

FAQ

What is CVE-2011-3599?

CVE-2011-3599 is a vulnerability with a CVSS score of 5.8 (MEDIUM). The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine...

How severe is CVE-2011-3599?

CVE-2011-3599 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2011-3599?

Check the references section above for vendor advisories and patch information. Affected products include: Adam Kennedy Crypt-Dsa, Perl Perl.